参考文献
[1]Amani S I,James H,John G,et al.CloudSec:A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model[C]//Proceedings of the 5th International Conference on Network and System Security.Washington D.C.,USA:IEEE Press,2011:113-120.
[2]Fatemeh A,Micha M,Malak A,et al.Virtual Machine Monitor-based Lightweight Intrusion Detection[J].ACM SIGOPS Operating Systems Review,2011,45(2):38-53.
[3]Jiang Xuxian,Wang Xinyuan,Xu Dongyan.Stealthy Malware Detection Through VMM-based “Out-of-the-Box” Semantic View Reconstruction[C]//Proceedings of the 14th Conference on Computer and Communica-tions Security.New York,USA:ACM Press,2007:128-138.
[4]Jones S T,Arpaci-Dusseau A C,Arpaci-Dusseau R H.VMM-based Hidden Process Detection and Identification Using Lycosid[C]//Proceedings of the 12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments.New York,USA:ACM Press,2008:91-100.
[5]周利荣,马文龙.Windows 7遍历PspCidTable表检测隐藏进程[J].计算机系统应用,2011,20(9):222-225.
[6]Wang Ying,Hu Chunming,Li Bo.VMDetector:A VMM-based Platform to Detect Hidden Process by Multi-view Comparison[C]//Proceedings of the 13th International Symposium on High-assurance Systems Engineering.Boca Raton,USA:IEEE Press,2011:307-312.
[7]Wen Yan,Zhao Jinjing,Wang Huaimin,et al.Implicit Detection of Hidden Processes with a Feather-weight Hardware-assisted Virtual Machine Monitor[C]//Proceedings of the 13th Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer-Verlag,2008:361-375.
[8]Cui Chaoyuan,Wu Yun,Li Ping,et al.VMPmonitor:An Efficient Modularity Approach for Hidden Process Detec-tion[C]//Proceedings of International Workshop on Cloud Computing & Information Security.Washington D.C.,USA:IEEE Press,2013:254-257.
[9]Xie Xiongwei,Wang Weichao.Rootkit Detection on Virtual Machines Through Deep Information Extraction at Hypervisor-level[C]//Proceedings of IEEE Conference on Communications & Network Security.Washington D.C.,USA:IEEE Press,2013:254-257.
[10]石磊,邹德清,金海.Xen虚拟化技术[M].武汉:华中科技大学出版社,2009.
[11]Nance K,Bishop M,Hay B.Virtual Machine Introspec-tion:Observation or Interference[J].IEEE Security and Privacy,2008,6(5):32-37.
[12]Leek T,Zhivich M,Giffin J,et al.Virtuoso:Narrowing the Semantic Gap in Virtual Machine Introspec-tion[C]//Proceedings of 2011 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2011:297-312.
[13]Chen P,Noble B.When Virtual is Better than Real[C]//Proceedings of the 8th Workshop on Hot Topics in Operating Systems.Washington D.C.,USA:IEEE Press,2001:133-138.
[14]Riley R,Jiang Xuxian,Xu Dongyan.Multi-aspect Profiling of Kernel Rootkit Behaviror[C]//Proceedings of EuroSys Conference.New York,USA:ACM Press,2009:47-60.
编辑金胡考 |